Insider

Get exclusive access to premium articles, product guides, reviews, how-tos, and more from CIO, CSO, Computerworld, InfoWorld, ITworld, and Network World - the best enterprise tech publications in the business. Learn more!

Europe trends 2018: GDPR may hit businesses hard

A big-picture look at what awaits Europe next year in terms of enterprise technology

artificial intelligence / machine learning / network

5 top machine learning use cases for security

Machine learning will make sense of the security threats your organization faces and help your staff focus on more valuable, strategic tasks. It could also be the answer to the next WannaCry.

4 source code

Is source code inspection a security risk? Maybe not, experts say

Some information security insiders raised a red flag when Russian requests to review security software code became known. The controversy may be a tempest in a teapot.

Why cryptojacking is an overlooked security threat

How compute power from many organisations is being slyly diverted into cryptocurrency mining

phishing hack scam malware binary code

GreatHorn detects the most carefully planned email attacks

Its ability to unmask phishing and social engineering attacks based on context truly sets it apart.

Is proposed US ‘hacking back’ law really going to help?

Legislation is at least raising the issue of proactive security tactics

firewall

Redefining perimeter network security: The future is a hybrid

As information pushes further into the cloud, the role of perimeter security is changing. It will become part of a multifaceted solution for network security.

What will be the single biggest security threat of 2018?

Our annual poll to find out what security professionals think the single biggest security threat of next year will be

roadblock road blocked barrier

5 ways users circumvent security measures and how to prevent it

Workers usually choose convenience over security, especially if you force them to jump through too many hoops. But there are steps you can take to shift the balance back in security's favor.

Hypervisor control: The next phase in the security arms race?

Hypervisor-based virtualised application protection tools enhance security, but there may be unintended consequences

firewall

Calling Barracuda's WAF a firewall is seriously selling it short

The Barracuda Web Application Firewall (WAF) is more than a firewall, it's like the core of an independent bastion of cybersecurity, able to inspect both inbound and outgoing traffic.

What if we gave nontechnical security issues vulnerability logos and names?

Which is worse: Pork Explosion and Dirty Cow or Invader and Stutter?

chair spotlight

6 missteps that could cost CISOs their jobs

Sure, a big preventable breach might easily cost a CISO his or her job. A few less obvious missteps could do the same.

phishing hack scam malware binary code

Is fake news dangerous? Security pros say yes

The influx of fake news has taken a social toll, but it is also an attack vector for phishing and malware delivery.

How quantum cryptography will soon be shaping online security

Neil Bramley from Toshiba discusses the role quantum computing will play in future security

pc antivirus

Bay Dynamics Risk Fabric puts vulnerabilities in context

Many vulnerability management programs will direct IT teams to the critical threat on the non-critical asset, and place a midlevel threat on a critical asset thousands of places down on the priority scale. It’s not the program’s...

hacker login password cliche

How hackers crack passwords and why you can't stop them

Password crackers have access to more stolen passwords and better password hacking software and tools than ever before.

4 compliance

11 top tools to assess, implement, and maintain GDPR compliance

Running behind on meeting the EU’s new GDPR privacy rules? These tools can help you meet the requirements and stay in compliance by deadline.

cyber attack virus meltdown

Crossbow offers live fire cybersecurity vulnerability testing

The vulnerability assessment platform is one of the most realistic tools, but also one of the most dangerous, that CSO has ever reviewed. All of the attacks that it can load or create are real, using actual techniques and tactics...

Four innovative ways to tackle the security conundrum

How businesses are finding innovative solutions to counteract ever increasing security problems

Load More